SlideShare a Scribd company logo
1 of 24
Download to read offline
RANSOMWARE
LOCKS DOWN EDUCATION
The new threat on campus:
in ransom payments in 2016
$1B
1,425% ROI
Sources: FBI, TrustWave
RANSOMWARE
IS A BOOMING
BUSINESS
Sophisticated Black Market
Cheap Exploit Kits
Ransom-as-a-Service (RaaS)
IT’S ONLY GETTING WORSE
Sources: FBI, TrustWave
Tuesday, January 17. 2017
Hollywood, California
METRO NEWS
HOLLYWOOD PRESBYTERIAN
HOSPITAL PAYS $17,000 RANSOM
HEALTHCARE HACKS
MAKE HEADLINES
Source: Bitsight
4X MORE LIKELY
BUT
EDUCATIONAL INSTITUTIONS
ARE ALMOST
TO GET HIT WITH
RANSOMWARE
EDUCATION
Source: Bitsight
IS NOW THE
FOR RANSOMWARE
TOP TARGET
1. DECENTRALIZED IT
 3 Reasons Why Education is So Vulnerable
DIFFERENT DEPARTMENTS—
DIFFERENT TECH
INCONSISTENCIES CREATE HOLES
RANSOMWARE FINDS THE
VULNERABILITIES
SPEAR PHISHING MADE EASY
“Higher education institutions have become
particularly vulnerable to ‘spear phishing.’”
– 2016 Beazley Breach Insights Report
INBOX
SEARCH
CONTACTS
SETTINGS
SUBJECT: URGENT
To: All Departments
From: The Dean
Please review the attached document immediately.
12/12/2016
2. ONCE RANSOMWARE HITS,
IT SPREADS EASILY
 3 Reasons Why Education is So Vulnerable
COLLABORATIVE CULTURE
“The relatively open nature of campus IT systems…
and a lack of restrictive controls…make higher
education institutions particularly
vulnerable to breaches.”
- Beazley Breach Insights
FILE SYNC  SHARE
SPREADS THE INFECTION
3. USERS HOLD
VALUABLE DATA
 3 Reasons Why Education is So Vulnerable
Security policy can’t fix unpredictable users
EDUCATION HAS ALL THE
TRADITIONAL TARGETS
Student Records Financial Data Proprietary Research
THE BIG TARGET:
INTELLECTUAL
PROPERTY
(IP)
THE IDEAS THAT DRIVE EDUCATION  RESEARCH
RANSOMWARE + USER ERROR
“A developer was infected by ransomware just as she was
completing a major project, and she hadn’t backed up
her work to the server. She thought her work was lost
and would surely have to pay, but with Code42 CrashPlan,
we were able to get her data back.”
— Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user
A Costly Combo
IDEAS AREN’T CREATED
ON SERVERS
INTELLECTUAL PROPERTY
LIVES ON DEVICES
ENDPOINT DATA:
A MAJOR BLIND SPOT
What data lives on the devices? Is that data backed up?
LEGACY BACKUP
 RESTORE
CAN’T BE TRUSTED
User-dependent
Backups
Infrequent
Backups
File Size
Limitations
Unreliable
Restores
SYNC  SHARE ­≠­BACKUP
+ + =Incomplete Data
Repositories
Synced
Encryption
Limited
Versioning
End User
Data Loss
1.	 COMPREHENSIVE DATA BACKUP
	 Never lose your data. Never pay the ransom.
2.	UNLIMITED FILE VERSIONING
	 Make a clean point-in-time restore.
3.	USER PROFILE BACKUP
	 Restore user settings and get users back to work.
4.	SELF-SERVICE RESTORES
	 Reduce IT costs and minimize downtime.
 4 Steps to Ransomware Preparedness
THE BIG
PICTURE: PLUGGING
HOLES WITH
CENTRALIZED
DATA
SECURITY
BENEFITS OF A CENTRAL
DATA SECURITY POSTURE
•	 Eliminate gaps and blind spots
•	 Enable complete visibility
•	 Ensure comprehensive backup
•	 Respond and recover faster
WHY CODE42?
DON’T TAKE OUR WORD FOR IT
7
Only enterprise backup
provider trusted by
Internet2 consortium
Ivy league schools
trust Code42
to secure their data
of8
ARE YOU PREPARED
FOR RANSOMWARE?
LET’S TALK.
code42.com/contact

More Related Content

What's hot

Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Securitysherrymoon7121
 
Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring RelationshipsDustianne North
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016Sal Rodriguez
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationDan Michaluk
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Chandrakanth Narreddy
 

What's hot (8)

Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Security
 
Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring Relationships
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 

Viewers also liked

How to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationHow to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationCode42
 
Social Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleSocial Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleDilip N
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware PresentationLucy Denver
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenSplunk
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формулаGrigory Korshunov
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensKevin Owens
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Carbonite
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at ScalePanasas
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011Carbonite
 

Viewers also liked (17)

How to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationHow to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider Exfiltration
 
Social Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleSocial Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant People
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Portfolio
PortfolioPortfolio
Portfolio
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формула
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-Owens
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.
 
JD Gen Book
JD Gen BookJD Gen Book
JD Gen Book
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at Scale
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
 

Similar to The New Threat on Campus: Ransomware Locks Down Education

Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Maximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesMaximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesDave Reynolds
 
Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitchAdam Root
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...hdicapitalarea
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconferencelvangiesen
 
Microservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaMicroservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaVMware Tanzu
 
Socal5minutes
Socal5minutesSocal5minutes
Socal5minutescromaine
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake NewsSandra Fathi
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real WorldNeo4j
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big DataBrendan Aldrich
 
Donor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketDonor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketBrandon Fix
 
DOF RGI Technology Presentation Nov 23 2011
DOF RGI Technology Presentation   Nov 23 2011DOF RGI Technology Presentation   Nov 23 2011
DOF RGI Technology Presentation Nov 23 2011clair611
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 

Similar to The New Threat on Campus: Ransomware Locks Down Education (20)

Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Maximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesMaximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data Services
 
Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitch
 
BBB Market Monitor: June2 021
BBB Market Monitor: June2 021BBB Market Monitor: June2 021
BBB Market Monitor: June2 021
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
Ovw2012
Ovw2012Ovw2012
Ovw2012
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
TCFV Conference
TCFV  ConferenceTCFV  Conference
TCFV Conference
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconference
 
Microservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaMicroservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with Kafka
 
Socal5minutes
Socal5minutesSocal5minutes
Socal5minutes
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real World
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big Data
 
Donor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketDonor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucket
 
DOF RGI Technology Presentation Nov 23 2011
DOF RGI Technology Presentation   Nov 23 2011DOF RGI Technology Presentation   Nov 23 2011
DOF RGI Technology Presentation Nov 23 2011
 
Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

The New Threat on Campus: Ransomware Locks Down Education

  • 1. RANSOMWARE LOCKS DOWN EDUCATION The new threat on campus:
  • 2. in ransom payments in 2016 $1B 1,425% ROI Sources: FBI, TrustWave RANSOMWARE IS A BOOMING BUSINESS
  • 3. Sophisticated Black Market Cheap Exploit Kits Ransom-as-a-Service (RaaS) IT’S ONLY GETTING WORSE Sources: FBI, TrustWave
  • 4. Tuesday, January 17. 2017 Hollywood, California METRO NEWS HOLLYWOOD PRESBYTERIAN HOSPITAL PAYS $17,000 RANSOM HEALTHCARE HACKS MAKE HEADLINES Source: Bitsight 4X MORE LIKELY BUT EDUCATIONAL INSTITUTIONS ARE ALMOST TO GET HIT WITH RANSOMWARE
  • 5. EDUCATION Source: Bitsight IS NOW THE FOR RANSOMWARE TOP TARGET
  • 6. 1. DECENTRALIZED IT 3 Reasons Why Education is So Vulnerable DIFFERENT DEPARTMENTS— DIFFERENT TECH
  • 7. INCONSISTENCIES CREATE HOLES RANSOMWARE FINDS THE VULNERABILITIES
  • 8. SPEAR PHISHING MADE EASY “Higher education institutions have become particularly vulnerable to ‘spear phishing.’” – 2016 Beazley Breach Insights Report INBOX SEARCH CONTACTS SETTINGS SUBJECT: URGENT To: All Departments From: The Dean Please review the attached document immediately. 12/12/2016
  • 9. 2. ONCE RANSOMWARE HITS, IT SPREADS EASILY 3 Reasons Why Education is So Vulnerable
  • 10. COLLABORATIVE CULTURE “The relatively open nature of campus IT systems… and a lack of restrictive controls…make higher education institutions particularly vulnerable to breaches.” - Beazley Breach Insights
  • 11. FILE SYNC SHARE SPREADS THE INFECTION
  • 12. 3. USERS HOLD VALUABLE DATA 3 Reasons Why Education is So Vulnerable Security policy can’t fix unpredictable users
  • 13. EDUCATION HAS ALL THE TRADITIONAL TARGETS Student Records Financial Data Proprietary Research
  • 14. THE BIG TARGET: INTELLECTUAL PROPERTY (IP) THE IDEAS THAT DRIVE EDUCATION RESEARCH
  • 15. RANSOMWARE + USER ERROR “A developer was infected by ransomware just as she was completing a major project, and she hadn’t backed up her work to the server. She thought her work was lost and would surely have to pay, but with Code42 CrashPlan, we were able to get her data back.” — Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user A Costly Combo
  • 16. IDEAS AREN’T CREATED ON SERVERS INTELLECTUAL PROPERTY LIVES ON DEVICES
  • 17. ENDPOINT DATA: A MAJOR BLIND SPOT What data lives on the devices? Is that data backed up?
  • 18. LEGACY BACKUP RESTORE CAN’T BE TRUSTED User-dependent Backups Infrequent Backups File Size Limitations Unreliable Restores
  • 19. SYNC SHARE ­≠­BACKUP + + =Incomplete Data Repositories Synced Encryption Limited Versioning End User Data Loss
  • 20. 1. COMPREHENSIVE DATA BACKUP Never lose your data. Never pay the ransom. 2. UNLIMITED FILE VERSIONING Make a clean point-in-time restore. 3. USER PROFILE BACKUP Restore user settings and get users back to work. 4. SELF-SERVICE RESTORES Reduce IT costs and minimize downtime. 4 Steps to Ransomware Preparedness
  • 21. THE BIG PICTURE: PLUGGING HOLES WITH CENTRALIZED DATA SECURITY
  • 22. BENEFITS OF A CENTRAL DATA SECURITY POSTURE • Eliminate gaps and blind spots • Enable complete visibility • Ensure comprehensive backup • Respond and recover faster
  • 23. WHY CODE42? DON’T TAKE OUR WORD FOR IT 7 Only enterprise backup provider trusted by Internet2 consortium Ivy league schools trust Code42 to secure their data of8
  • 24. ARE YOU PREPARED FOR RANSOMWARE? LET’S TALK. code42.com/contact